connection assignment

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ Data Mining ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)

parsing tree programing assignment

Similar to the parsing tree example in class, there is not much usefulness in parsing and evaluating statements without an operator. Therefore, it is safe to assume that any input to your parsing tree will contain an operator.

Examples of valid inputs are: 

  • ( T AND F )
  • ( ( T OR M_0.3 ) AND P_0.8 )
  • ( P_0.9 OR M_0.4 )

Example of inputs that are not expected (and that you don’t need to account for):

  • ( T )
  • ( P_0.85 )
  • ( F )

Also, if you haven’t started, and want a clean slate to start with, use this skeleton code in MS Teams: mp_parse.py (Links to an external site.)

What is the assignment?

  • To implement functions to build, evaluate, and print expressions using our (made-up) maybe-probably logic

What to hand in? 

  • One (and only one) *.py file should be handed in. All your checks, unit tests should be inside of this file (similar to last assignment).
  • Note that your program should be able to be run at console/terminal (e.g. $ python your_file.py). If it does not, then the execution portion of the assignment will be 0. 
  • Also note that you do not need to hand in binarytree.py nor stack.py; and you do *not* need to copy them into your file. Just import them. (For Peer Reviewers, ensure you put the code you will review in the same directory as 

What needs to be done? 

The primary tasks in this fourth assignment are to implement the following three functions.

1. buildMPLogicParseTree(s) – this function should take a string as input (e.g. s = ‘( T OR P_0.9 )’) and should return the binary tree representing the parse tree as described in class

2. evaluateMPLogicParseTree(t) – this function should take a binary tree as input and should return a T or an F that is based on the on the input statement

3. printMPLogicExpression(t) – this function should take a binary tree as input and should return the string that looks like the original string (perhaps with extra parentheses)

4. create some examples of how your functions work (inside of def main()), and test that each of the functions works correctly (using unittest)

Note: Those exact function names above should be used. If those name are not used 10pts will be automatically deducted.

Also:

  • you should use the file parsetree.py for inspiration (located in MS Teams -> General -> Files -> Code); note: that file is for building entirely different types of parse trees so only parts of it will be relevant to this assignment
  • you will also want to download the files binarytree.py and stack.py, and import them from your *.py file (all three files will need to exist in the same directory/folder)
  • as with the last assignment, your *.py file will be run through a test script 

When you submit your assignment, it will be graded in large part based on whether it successfully runs when using different input strings. The tests will roughy look like the following:

pt = buildMPLogicParseTree('( ( T AND F ) OR M_0.3 )')
ans = evaluateMPLogicParseTree(pt)
exp = printMPLogicExpression(pt)
# pt, ans, and exp will all be checked to ensure they are correct

Again, several different input strings will be also be tested.

When an M_x or P_x is present then the test will confirm that your tree evaluates to the correct average.

For example, the above input string will evaluate to T roughly 30% of the time. 

What does maybe-probably logic look like again, exactly? 

The symbols of our maybe-probably Boolean logic are:

  • T – denotes True
  • F – denotes False
  • M_x is a maybe symboled that evaluates to true with probability x, 0.0 <= x <= 0.75 Ø
  • P_x is a probably symbol that evaluates to true w/ probability x, 0.75 <= x < 1.0 Ø
  • AND, OR – the two operators (note, these are binary operators)
  • (, ) – parentheses are to be used in the same way as with the parse tree.py example we saw in class

Some additional examples of statements in this language are:

  • ( T AND F ) a should evaluate to F for False
  • ( T OR F ) a should evaluate to T for False
  • ( M_0.7 ) a should evaluate to T for True 70% of the time
  • ( M_0.9 ) invalid since parameter x is greater than 0.75!!
  • ( ( P_0.8 AND T ) OR ( M_0.25 ) ) a should evaluate to true 85% of the time

As with other assignments, the final code should be your own work. However, discussing the general approach, or specific Python issues/functions, with others (e.g. on MSU Discord server), is acceptable, and encouraged! Of course, don’t hesitate to ask questions in MS Teams, by email, and in class. Again, note that the tree should include x, and that M_x or P_x terms should evaluate only inside of the evaluate function.

Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Please write 350 words essay with references.

With an idea as to how to conduct a digital investigative project  ; you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

Fun Run 3 – Multiplayer Games

Run 3, is the third game in the Run trilogy. 

Run 3 takes place in a series of tunnels in space. 

To play the amazing run 3 game, the players have to run and jump to pass different levels of obstacles. 

Run 3 introduces a number of new mechanics not seen in the previous games, including crumbling tiles, ramps, darkness, and the ability to re-enter a tunnel after jumping out.

People remember this game as a game everyone plays at school. 

Good luck and have fun guys! 

How To Play:

Use the left and right arrow keys to move.

Use Space to jump.

Review: Run 3 online. 

When running into another lane, that lane will turn into the floor.

You can pause/resume/restart, switch aliens and turn the music, sound on/off in the pause menu.

Discussion

 MIT computer science professor Harold Abelson has said, “In today’s online world, what your mother told you is true, only more so:  people really can judge you by your friends.”  Have you ever been upset or embarrassed by what your friends posted on Facebook or other social media sites?  Are you concerned that people (other friends, colleagues, employers or potential employers, etc.) are going to judge you based on what your friends are posting? 

Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)